Posts tagged for “Stealth”
The Unisys team is excited to be attending this year’s IP Expo Europe taking place from 5th – 6th October at London’s ExCeL centre. Come visit us at stand CC8 to learn all about the changing world of the digital enterprise and how our Stealth solution suite can lower risks and costs in the fight against cyber threats.
Posted by: Nick Miles on September 14th, 2016
Unisys is a Platinum Sponsor at Gartner’s Security & Risk Summit in London. On the 12th – 13th September, Gartner’s Security and Risk Summit 2016 will be held at the InterContinental London at The O2.
Posted by: Nick Miles on September 8th, 2016
There are three new game-changing security strategies that can deliver on a new approach, that understands security must be effective without being perfect, that it must embrace modern technology like clouds and mobile and IoT, and must support the new business models of integrated supply chains and customer self-service.
Posted by: Tom Patterson on May 24th, 2016
Find out how enterprises can now leverage platforms such as AWS to host even their mission-critical business applications, and achieve significant savings on capital expenditure, without fear of introducing a new vector for threats and breaches.
Posted by: Premkrishnan Venkatasubramanian on May 6th, 2015
It is clear that enterprises can now no longer rely on the traditional external defense mechanisms, and need to adopt a “defense-in-depth” approach coupled with innovative new approaches to securing their data centers.
Posted by: Premkrishnan Venkatasubramanian on November 14th, 2014
For week three of National Cyber Security Awareness Month, we're providing three tips for critical infrastructure protection.
Posted by: Stephen McCarney on October 15th, 2014
Discover three key activities that need to be accomplished for an effective sensitive data protection strategy.
Posted by: Francis Ofungwu on September 4th, 2014
Protecting sensitive data has become a complex proposition for a majority of organizations. The network perimeter of the past has vanished and data can no longer be contained, let alone protected.
Posted by: Scott Johnson on June 25th, 2014
Protecting sensitive data and networks has become a complex proposition for a majority of organizations. Stealth provides proactive protection by cloaking servers and endpoints such that attackers cannot see the device to relegate an attack against.
Posted by: Linda Welch on June 5th, 2014
With cyber assaults continuing to escalate in frequency, scale and sophistication, executives in critical infrastructure organizations are taking action. Find out how sophisticated technology solutions can improve safety, protect critical data and systems, facilitate compliance, and reduce costs – all at the same time.
Posted by: Stephen McCarney on May 23rd, 2014